These SMB exploits on unpatched Windows computers may go on for years?

Here is the article in question:

The leaked … hacking tool that will wreak havoc for years to come

“We expect EternalBlue to be used for years to come by both espionage and criminal actors,” said Area 1 Security co-founder Blake Darché, a former network analyst. “SMB vulnerabilities are key to conducting a destructive computer network attack with great efficacy.”

The masterfully engineered hacking tool had once provided U.S. spies with “unreal” intelligence, one former U.S. official told the Washington Post.

Without an update, operating systems vulnerable to EternalBlue include Windows XP, Windows Vista SP2, Windows 7, Windows Server 2008 R2 and Windows Server 2012 — each remains popularly used, especially outside of the U.S.

Craig Williams, a senior technical leader with Cisco’s elite threat intelligence collection unit, Talos, described the module as a sort of “lock pick that can open windows machines which have not been patched.”

“Once the door has been unlocked any payload can be snuck inside,” said Williams. “This means we will continue to see threats like botnets, ransomware, DDoS kits, etc. continue to take advantage of this as long as there are vulnerable machines. It’s likely it will be years until we see the end of this threat.”

It’s likely that EternalBlue will be used in other ransomware-style attacks in the near future, predicts Brian Martin, a vice president of vulnerability intelligence for U.S. cybersecurity consultancy Risk Based Security.

In the last week, a different malware variant dubbed EternalRocks was also discovered in the wild using code from both EternalBlue and another … tool codenamed DoublePulsar, which functions as a backdoor implant.

So my question is: Is this right? That this will go on for years?

Continue reading These SMB exploits on unpatched Windows computers may go on for years?

7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.

Samba is open-source software (re-implementation of S… Continue reading 7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely

Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2

A security researcher has identified a new strain of malware that also spreads itself by exploiting flaws in Windows SMB file sharing protocol, but unlike the WannaCry Ransomware that uses only two leaked NSA hacking tools, it exploits all the seven.

Continue reading Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2

Weeks Before WannaCry, Cryptocurrency Mining Botnet Was Using Windows SMB Exploit

A security researcher has just discovered a stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks.

According to Kafeine, a security researcher at Proo… Continue reading Weeks Before WannaCry, Cryptocurrency Mining Botnet Was Using Windows SMB Exploit

WannaCry Ransomware: Everything You Need To Know Immediately

By now I am sure you have already heard something about the WannaCry ransomware, and are wondering what’s going on, who is doing this, and whether your computer is secure from this insanely fast-spreading threat that has already hacked nearly 200,000 Windows PCs over the weekend.

The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable

Continue reading WannaCry Ransomware: Everything You Need To Know Immediately

WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives

Update — After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article “WannaCry Ransomware: Everything You Need To Know Immediately.” 

If you are following the news, by now you might be aware that a security researcher has activated a “Kill Switch” which apparently stopped the WannaCry

Continue reading WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives

Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)

Update — After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article “WannaCry Ransomware: Everything You Need To Know Immediately.” 

In the wake of the largest ransomware attack in the history that had already infected over 114,000 Windows systems worldwide since last 24 hours, Microsoft

Continue reading Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)